Acquire Security & Risk Analysis

wordpress.org/plugins/acquire

Acquire live chat provide video, voice and text chat solution with co browsing, screen sharing and real-time monitoring features.

10 active installs v1.0.2 PHP 5.2.4+ WP 4.9.4+ Updated Oct 14, 2019
acquireco-browsinglive-chatlive-video-chat
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Acquire Safe to Use in 2026?

Generally Safe

Score 85/100

Acquire has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "acquire" plugin version 1.0.2 demonstrates a generally positive security posture based on the provided static analysis. The absence of any discovered CVEs in its history and the lack of critical or high-severity findings in taint analysis are strong indicators of a well-developed and secured plugin. Furthermore, the analysis shows no dangerous functions, no file operations, and no external HTTP requests, which significantly reduces potential attack vectors. However, a concerning aspect is the 50% rate of improperly escaped output. While there are no direct indicators of immediate severe exploitation, unescaped output can lead to Cross-Site Scripting (XSS) vulnerabilities, especially if the plugin were to handle user-generated content or dynamic data in the future. The plugin also lacks explicit capability checks and nonce checks, which, while not immediately problematic given the limited attack surface reported, represents a potential weakness if new entry points are added without proper security considerations. In conclusion, the plugin's current security is strong due to its clean vulnerability history and lack of critical code signals. The primary area for improvement lies in ensuring all output is properly escaped to mitigate the risk of XSS vulnerabilities and considering the implementation of robust authorization checks for future development.

Key Concerns

  • 50% of outputs are not properly escaped
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Acquire Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Acquire Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped8 total outputs
Attack Surface

Acquire Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuacquire.php:25
actionwp_footeracquire.php:34
actionin_plugin_update_message-acquire/acquire.phpacquire.php:44
Maintenance & Trust

Acquire Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedOct 14, 2019
PHP min version5.2.4
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Acquire Developer Profile

acquire.io

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Acquire

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/acquire/images/logo-small-1.svg
Script Paths
https://s.acquire.io/a-

HTML / DOM Fingerprints

CSS Classes
wrap
HTML Comments
Click to toggle
Data Attributes
acquire_remove_wp_pluginacquire_user_loginacquire_user_save_account_IDacquire_user_account_status
Shortcode Output
<p><a href="https://www.acquire.io?welcome" title="live chat software">Acquire</a></p>
FAQ

Frequently Asked Questions about Acquire